This presentation,
DEFEATING THE NETWORK SECURITY INFRASTRUCTURE.pdf, was made after some brainstorming with some
friends. The purpose of the discussion is to debate how internal
enterprise resources might be (in)adversely exposed to the internet by an insider, using common
protocols, tools and techniques such as SSH, HTTP(s) and proxying.

Something I wrote a while ago about spoofing,
transparent proxying and wireless networking. Use with care and only for educational purposes. The paper is called
Trick the wireless user.

I recently had the opportunity to speak at an ISSA event in Belgium about Web Application Firewall
technology, also known as WAF.
The presentation can be downloaded
here or at the
ISSA Belgium website.

I had the pleasure to talk at the Belgium OWASP chapter.
Here is a copy of the introduction presentation on WEBGOAT and the PANTERA Web Assessment Studio Project.